Architectural tactics in software architecture: A systematic map** study

G Márquez, H Astudillo, R Kazman - Journal of Systems and Software, 2023 - Elsevier
Architectural tactics are a key abstraction of software architecture, and support the
systematic design and analysis of software architectures to satisfy quality attributes. Since …

Committed to trust: A qualitative study on security & trust in open source software projects

D Wermke, N Wöhler, JH Klemmer… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
Open Source Software plays an important role in many software ecosystems. Whether in
operating systems, network stacks, or as low-level system drivers, software we encounter …

Software security in open source development: A systematic literature review

SF Wen - 2017 21st Conference of Open Innovations …, 2017 - ieeexplore.ieee.org
Despite the security community's emphasis on the importance of building secure open
source software (OSS), the number of new vulnerabilities found in OSS is increasing. In …

It's like flossing your teeth: On the importance and challenges of reproducible builds for software supply chain security

M Fourné, D Wermke, W Enck, S Fahl… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The 2020 Solarwinds attack was a tip** point that caused a heightened awareness about
the security of the software supply chain and in particular the large amount of trust placed in …

Evaluating performance of Web application security through a fuzzy based hybrid multi-criteria decision-making approach: Design tactics perspective

M Alenezi, A Agrawal, R Kumar, RA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Design of software can have a major impact on the overall security of the software.
Develo** a secure website design is a challenge for architectures. It depends on different …

Software security estimation using the hybrid fuzzy ANP-TOPSIS approach: Design tactics perspective

A Agrawal, AH Seh, A Baz, H Alhakami, W Alhakami… - Symmetry, 2020 - mdpi.com
Increasing the number of threats against software vulnerabilities and rapidly growing data
breaches have become a key concern for both the IT industry and stakeholders. Develo** …

[PDF][PDF] Evaluating the impact of malware analysis techniques for securing web applications through a decision-making framework under fuzzy environment

R Kumar, M Alenezi, MTJ Ansari, B Gupta… - Int. J. Intell. Eng …, 2020 - inass.org
Nowadays, most of the cyber-attacks are initiated by extremely malicious programs known
as Malware. Malwares are very vigorous and can penetrate the security of information and …

Understanding software vulnerabilities related to architectural security tactics: An empirical investigation of chromium, php and thunderbird

JCS Santos, A Peruma, M Mirakhorli… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
To satisfy security requirements, software architects often adopt security tactics. These
architectural tactics provide mechanisms for resisting, detecting, reacting to and recovering …

An empirical study of tactical vulnerabilities

JCS Santos, K Tarrit, A Sejfia, M Mirakhorli… - Journal of Systems and …, 2019 - Elsevier
Architectural security tactics (eg, authorization, authentication) are used to achieve
stakeholders' security requirements. Security tactics allow the system to react, resist, detect …

Security tactics selection poker (TaSPeR) a card game to select security tactics to satisfy security requirements

F Osses, G Márquez, MM Villegas, C Orellana… - Proceedings of the 12th …, 2018 - dl.acm.org
Building secure software architectures requires taking several design decisions to achieve
security requirements; these decisions must be revised carefully before agreement given …